The Key to Transacting with Trust In the “Selfie” Generation

 

There are 70 million of them in the U.S. alone. They are “digital natives,” who grew up with the Internet and are fluent in mobile technology and social media. They spend a whopping $600 billion annually – and growing. They are forecasted to account for 35% of spending by 2030. They are set to outnumber Baby Boomers next year and are the largest generation in the workforce. They take, on average, one selfie every day and account for 55% of selfies on social media.

They are the deeply studied, oft-maligned Millennial generation. Pew Research has defined this group as those born from 1981-1996.

Studies also show that they keep their mobile phone with them all the time (not more than 3 feet away) and they love their cameras. One survey found that 68% of Millennials would rather snap a picture than type something into their device. They have big ideas of how to use the smartphone camera to make transactions easier.

Millennials are using smartphones daily to conduct their business, whether it’s shopping, making payments or banking. And in the sharing economy, they are using popular apps to use these services via their smartphone. Some reports show they are deciding to who to do business with based on their mobile capabilities. This should be a wake-up call for all industries wanting to tap into this influential demographic. Even the Olympics has adopted this technology for the 2020 Tokyo Olympic games utilizing facial recognition.

Let’s look at banking for moment. An infographic from the American Bankers Association shows that banks that offer digital services are better positioned to reach Millennials. In fact, Millennials are three times more likely to open a new account with their phone vs. in person. Consumers commonly think that opening a bank account is a cumbersome process – so many forms to fill out and documentation to provide. But while banks collect more information then ever before and have more steps during onboarding due to regulatory compliance, they can provide a better digital experience to a generation used to signing up for new accounts via mobile devices.

Millennials prefer taking a picture for data capture. More than half have deposited a check by taking a picture with their smartphone. They are optimistic that mobile capture will be part of all mobile transactions in the next five years. Whether that’s for banking, or a car rental service, or a visit to the doctor’s office, the ease of snapping a photo is vastly superior to filling out long, tedious forms. It’s not surprising then why so many users of Acuant’s AcuFill solution report they save time and impress customers with a streamlined and modern on-boarding process.

Beyond mobile capture, Millennials also prefer to validate and verify their identities via facial recognition. The introduction of the iPhone X and its facial recognition technology became the first real mainstream use of this concept. Acuant’s FRM (Facial Recognition Match) technology can make this an option for just about any online transaction. The process can be as easy as taking a selfie and knowing in seconds whether there is a match, or the transaction should be flagged for fraud.

One common form of facial recognition fraud is using a photo to assume someone else’s identity – a face spoof attack. Acuant FRM uses a liveness test to prevent this and ensure that it’s a live person taking that selfie. This type of verification can be useful in two scenarios – when you want to be sure that the ID is valid and that the person matches the photo on the ID, and when you already know this customer and only need to know that this person is actually the person who holds the account.

When appealing to and engaging Millennials, it is important for businesses to provide a seamless, modern experience that meets their digital expectations. At the same time, that user experience must be balanced against risk – and how much risk you are willing to accept.

 

 

download free infographic

Five Identity Proofing Trends in Identity and Access Management for 2018

 

The days of auto-filling your personal information in exchange for “free” access, content and offers are limited. People generally don’t think twice about providing personal information in exchange for what they want quickly, but that is beginning to change as cases of personal data being misused and even breaches on major platforms increase (see Facebook).

The issue of regulations around Personally Identifiable Information (PII) is coming to a head. Self Sovereign Identity (SSI), the concept that people and businesses can store their own identity data on their own devices and provide it efficiently to those who need to validate it, without relying on a central repository of identity data, and what that should mean is paramount in the digital age. The idea of owning your own data and consenting to its use may have seemed impossible just a few years ago. However, European courts gave someone the right to be forgotten and scrubbed from Google search results in 2014 and Google says it has received more than 650,000 requests to remove certain websites from its search results since.

Identity and Access Management (IAM) is moving toward fewer instances of storing personal data and more toward scenarios where information is requested as needed to process services.

As businesses look for ways to streamline and secure digital transactions, here are some of the top IAM trends:

 

People Will Own Their Data

Due to GDPR and other similar laws going into effect, more and more digital interactions will rely on individuals giving consent for their data to be used. This practicality has birthed the concept of Self Sovereign Identity (SSI) where a person holds and controls all of their own data, including biometrics. This concept could,  and has already in some countries , give way to passport-less travel, where an individual’s biometrics will be used to access all the information needed for border control.

 

Biometric Authentication Will Go Mainstream

Biometrics is not just a novel way to unlock your iPhone anymore. Expect to see more mainstream adaptations of biometric authentication as leaders in IT fear digital threats will continue to increase. Access control, in particular, is moving from access cards to biometrics with gait recognition being the technology that is gaining popularity for high-security areas.

 

More Industries Will Invest in Blockchain

The future of using cryptocurrency such as bitcoin for everyday transactions remains to be seen. However, companies like Mastercard are utilizing blockchain technology to reduce fraud and credit card skimming. Mastercard plans to roll out its investment into blockchain technology – the company is the largest holder of blockchain-related patents in the world.

In addition to the finance industry investing in blockchain, healthcare is another industry that is highly concerned with secure yet more streamlined documentation. Ideally, healthcare records would be complete and travel with the patient regardless of doctor or insurance changes. This is still a working concept as the records are stored in many different systems, which have resulted in many recent high-profile data breaches.

 

Artificial Intelligence Will Improve Security

Currently, Artificial Intelligence is powering identity solutions by learning from millions of transactions and documents to spot anomalies. This is a powerful tool to help combat fraud. Industry leaders envision a future where AI can monitor computer sessions to identify if a real person is conducting a transaction or if a session is abnormal or the result of a breach. Rather than checking against credentials, AI could use a combination of biometrics and user behavior to figure out whether that person poses a risk to security. AI learning the identity of users and their habits dynamically is still a future technology but is one that shows a lot of promise.

 

Investments in building identity solutions for your business need to include both proven experience as well as groundbreaking innovations. Acuant is proud to be one of the four providers of Identity Proofing Solutions named IDC Innovators, offering the combination of physical document and biometric authentication through human assisted machine learning.

 

 

Beyond Machine Learning

How Identity Verification Solutions Can Make Summer Travel a Breeze and Enhance Revenue

We all look forward to summer travel plans, but there can also be some stress involved including long lines at the airport, car rental counters, and hotels. The good news is that identity verification technology is being adopted to make these processes more streamlined and efficient; as an added benefit to businesses, they are revenue enhancing and customer pleasing.

A growing number of customer-facing processes in hospitality depend on identity verification, especially due to the growth of sharing economy businesses like Airbnb. Customers, most notably the well-traveled Millennial market, increasingly prefer to do everything from booking to check-in to keyless entry from their mobile devices. With mobile scan-and-verify solutions, it becomes possible to securely accommodate guests who’d like to avoid check-in lines altogether. And if they cause damage, you have all the verified information you need to recoup losses and report them to law enforcement.

As more hotels get mobile and hi-tech with their offerings, ID capture and verification is essential. These include digital keys, concierge text chat, guest service apps, self-serve kiosks, and mobile check-in. Identity verification also reduces fraud and enhances visitor security programs in a very customer friendly and cost-efficient manner.

In a recent study by Resonance Group, surveys showed that Millennial travelers highly value free Wi-fi, privacy, and safety. Customer data-driven offerings like kiosks, branded apps, mobile check-in, and keyless entry hit all these highly valued needs while simultaneously benefiting customer and business. Innovative digital processes make the vacation experience at leading brands more convenient, relaxing, and comfortable. Streamlined service interactions (virtual concierge), advanced amenities and sophisticated back-end processes (room availability, fraud prevention) all involve the capture and use of customer data. Those same solutions will also reduce risk, revenue and property loss while enhancing the customer experience.

Scan-and-verify solutions include desktop devices and mobile scanning apps that quickly capture and digitize all the information from a driver’s license, passport, or other identity card. The digitized information is automatically exported to customer database records, and a digital replica of the ID is stored for regulatory and security purposes. The information, including photo ID, can then be checked against DMV records, credit bureaus, and other databases to verify the guest’s identity and payment method. Customer records can then be used by internal systems to complete billing and marketing processes. Personal data can also be leveraged, through CRM and GEM systems, to create more tailored experiences and to target opportunities to upsell and maximize revenue from each guest during their visit. Scanning IDs reduces keystroke entry errors, eases language barriers for foreign guests, and frees customer service reps to have more meaningful and relaxed interactions with guests. The entire check-in experience is streamlined and pleasant with fewer manual tasks.

Vacation is supposed to allow us to escape everyday stress and relax. With advanced identity capture and verification solutions, hotels, rental agencies, and tourist attractions can start to deliver that smooth-sailing experience before customers even arrive.

 

 

Read A Hospitality Case Study

Acuant Talks Identity Proofing with TAG Cyber

Recently, we spoke with Ed Amoroso of TAG Cyber on the topic of identity verification solutions today in the marketplace. Here are some of the highlights:

     Our discussion covered the wonderful work they are doing to simplify, integrated, consolidate, and secure the tangle of identification documents, and associated validation processes that are not exactly the pride of our society. I think their approach is solid, and I’ll try to share with you below what I learned:

“Our purpose at Acuant,” explained Kevin Vreeland, Managing Director, “is to simplify the identity validation ecosystem to maximize the trust of any transaction that is reliant upon an individual’s identity. We believe identity is the new currency, and it is more important than ever that PII is protected. Acuant accomplishes this by providing workflows that are fast and secure by streamlining the lifecycle process for establishing confidence in a reported identity.”

The Acuant solution is offered in three levels: First, images of credential information such as driver’s licenses are captured into the app to support basic tasks including familiar auto-fill into on-line forms. Second, strong authentication is performed in seconds by more than fifty forensic tests including biometric facial recognition, often needed for higher assurance. And third, the solution supports both RFID and a manual review for the most critical applications.

Our conversation moved quickly to privacy, and establishing confidence to put all of one’s credentials into one bucket. Vreeland explained the company’s approach to encryption and its disaggregation of credentials as they are validated, significantly reduce the risk of any compromise. He stressed the company’s belief that individuals should be in control of PII. He also outlined rational use-cases for stored and non-stored credentials by the app provider.   

 

You can read the full blog here.

At Acuant we are mindful that a mission must be founded upon a set of core values and business principles. For us this means that we take a customer centric approach that defines our purpose, guides our products and harnesses the innovation and enthusiasm of our people.

We recognize that the need for strong, customer-friendly identity proofing solutions has never been greater. As PII is continuously jeopardized, Acuant serves to find a way to create trusted transactions that puts individuals at ease and in control, while simultaneously allowing businesses to address their appropriate level of risk.

 

Contact us today to learn more

Buzz from the Know Identity Conference 2018

The 2nd annual Know Identity Conference just took place in Washington DC and Acuant was in attendance to catch this year’s buzzworthy topics. A major one was how firms will establish consumer identity especially in the digital world and how/when most consumers would use digital identity.  Enter SSI. The industry has unified around the term self-sovereign identity (SSI) to represent both the digital identity credential and the right for the consumer to control access to it and who gets what portion of their identity.

 

So how do we test whether digital identity is ready for the consumer mainstream? One line of thought by David Birch of Consult Hyperion, was that by taking care of 3 audiences of online consumers (the 3 W’s), that would be enough to ensure the right amount of protection to make business transactions secure. The 3 W’s are witness protection, whistle blowers and people who browse explicit material (wankers in his informal British prose). If digital identities allow the 3 W’s to browse anonymously and protect their transactions, then we can all have an appropriate level of security in the digital world.

 

Scott Galloway, a professor at NYU Stern School of Business, worries about the ever-increasing control of personal information in the digital world by four companies: Google, Facebook, Amazon and Apple.  He calls these firms the brain, heart, stomach and libido of the digital world.  These four companies each create more revenue each year than the GDP of all other nations except USA, China, Japan and Germany.  Scott argued these companies are already monopolies and innovation could gather renewed energy if these companies were broken into smaller entities, further pondering that they may have just too much information about individual consumers. In the backdrop of the recent Facebook debacle and the pending European GDPR laws, protection of consumer information was at the forefront of many conversations.

 

The General Data Protection Regulation (GDPR) goes live May 2018.  The hardest part of compliance with this new regulation mentioned by many of the panelists, is compliance with the laws mandating the right for a consumer to be “forgotten” by any company.  With the size and breadth of systems in many companies, the right to erasure of a consumer may prove a daunting task. The days of selling consumer contact lists will be over in the EU come May and the UK is currently racing down the path to adopt similar laws as GDPR by the end of 2018.

 

Biometrics and its various forms was also highly visible at the conference.  Most sessions and panels discussed biometrics whether it was facial recognition, iris, fingerprint or voice as the natural next step in security. Most experts suggested a multi-modal approach to biometrics (more than one biometric) as there always needs to be a fallback when something does not work quite right. The fear factor of biometrics is much lower now and with adoption rates increasing we should all expect to see more usage across industries.

 

Lastly, there was a theme of hope as digital ID was seen as a solution to the unbanked and underrepresented for many parts of the world.  Many areas where government IDs are made available at birth (but other forms of identification are scarce, unreliable or inaccurate), could benefit from digital IDs backed by initial ID documents.  With Washington DC as a backdrop, new ways of proving identity with low friction, high confidence and mobility shined through.

 

 

security white paper cta

How Identity Verification Technology is Changing the Auto Industry, from Rentals to Car & Ridesharing Services

A Better Car Rental Experience with Fraud and Theft Protection

When it comes to renting a car, the first thought people have is of long lines and annoying paperwork including photocopying of IDs and insurance cards. It is not a pleasant experience, but one that most will justify going through for the outcome. Smart rental companies are realizing that in order to retain and attract customers, they need to make this experience faster and less painful. Today, consumers have many choices that compete with rentals.

Technology that automates the intake of ID documents like driver’s licenses and insurance cards, speeds up the process and protects businesses. Simply scan an ID to auto-populate the information into CRM or Dealer Management Systems and store data and images of the ID, no photocopies or pages of paperwork needed. With mobile devices, businesses can offer rental cars from any location or even drive the vehicle to the customer.

Another benefit to the rental companies is the protection ID verification provides. In the same swipe or mobile capture of an ID, the license can be verified in seconds to ensure that it is not fake and the driver is who they claim to be. This prevents fraud by catching fake IDs and provides a copy of the license image on file which is needed in many states to submit claims for stolen vehicles. Rental theft can be very costly and is often accomplished with only the aid of a fake ID.

Easy and Secure Car Sharing

The car sharing market continues to grow as many would-be car owners in cities and urban areas feel it is more economical and even more environmentally friendly to opt for a service such as Zip Car. Drivers can simply pick up vehicles they locate on a mobile app and can drive them to a destination for easy drop-off.

ID verification allows for quick and easy onboarding of members for such service providers. They can verify the identities of their users, ensure that a license is valid and have their ID images and data on file. Facial recognition match or other biometric technology can then be used to unlock cars at their pick-up location. The process is easy, fast, convenient and most importantly, secure. Businesses can protect their fleet and know who is driving their cars.

Safer Ridesharing Services

Another extremely popular form of transportation is ridesharing services such as Uber and Lyft. New services are popping up worldwide due to the convenience and ease of use this model provides. Users simply access a mobile app for on-demand service, but the service is not without pitfalls as evidenced by many stories of rides gone bad. This can be due to a bad customer or a bad driver. In both cases, it is important to know the identity of both parties.

Ride Sharing companies must properly identify their drivers and know who is providing services at all times. ID verification technology allows for this with proper validation for customer onboarding and proper validation and screening of drivers. Riders should also provide proper ID when signing up so that drivers will always know who is in the car with them should any trouble or danger arise, and drivers should have to initially and continually prove their identity. A preliminary check will catch fake ID’s and continual checks for drivers via biometrics such as facial recognition match, can ensure that the driver is who they claim to be throughout service times.

Acuant Announces 3 New Auto Partners

Navotar

Navotar is a worldwide provider of fleet management software for rental companies, dealerships, and automotive manufacturers. Through this partnership, car rental customers will now be able to do a quick scanning of passports and driver’s license for data extraction into Navotar customer management systems, while at the same time verifying their validity in seconds. Acuant optimizes operations and provides an additional layer of security against fraud.

Working in real time, the partnership eliminates manual screening errors, speeds up the document inspection process and significantly reducing employee training, operating costs and customer inconvenience.

Clutch Technologies

Clutch’s vehicle subscription platform provides the automotive industry with an innovative and scalable way to enable vehicle subscription access. Clutch chose Acuant’s patented technology to authenticate driver’s licenses. As part of the verification process, Acuant extracts biometric and alphanumeric data from IDs and applies 50+ forensic tests instantly. Clutch will also perform facial recognition match to validate users. Acuant FRM is as easy as taking a selfie and comparing it to biometric data contained in the government-issued ID. Results are given in seconds, comparing the face biometrics of a selfie to the image on the ID and include a liveness detection test to prevent fraudsters from using static images by ensuring that a live person is in front of the camera.

 

Pony Car Sharing

Pony Car Sharing is Romania’s first and largest car sharing service. Offering flexible pricing models, cars are parked on the street where users unlock them with mobile phones and can track them in real time on the app. Pony Car Sharing chose Acuant to verify members during onboarding, automatically capturing and validating identification information. Identity information will then accurately auto-populate the Pony Car Sharing database. This eliminates manual entry, photocopying and paperwork. Pony Car Sharing will also employ facial recognition match for stronger authentication. Customers using the Pony Car Sharing app can be remotely authenticated and unlock cars with their mobile phones.

To learn more about Acuant Solutions Book a Meeting today!

 

 

5 Reasons Why Every Business Needs Identity Proofing Solutions

Securely gathering information from customers and verifying the identities of those who provide it is becoming a simpler task with the advent of identity proofing solutions. There are solutions that enable businesses to capture, process and verify customer information in a single step without compromising customer’s personal information.

Modern identity verification platforms combine hardware systems, software and even cloud-based solutions to make the verification process as easy as swiping a credit card. No more paper forms to fill out, no manual typing of information, no long lines and you can even conduct transactions remotely from your phone that once required a physical visit.

With major data breaches and hacking making headlines regularly (see the latest on Facebook), and identity theft on the rise, installing identity proofing solutions would seem to be a no-brainer. There are many cost-efficient, and even revenue enhancing options, that easily integrate into any environment in any industry.

Still not convinced? Here are 5 reasons why your business should be investing in identity solutions now.

1. Streamlined Processes, Greater Accuracy & Enhanced Operations Increase Revenue

Whether they are paper-based or computerized, using forms to gather customer information has its limitations. Customers spell things incorrectly, leave things blank or mistype information. Handwriting can be difficult to read on paper-based forms, leading to data entry errors. Even your own employees can make mistakes when typing information or merging it with other data in the system. Automating data capture and the filling in of ID data into electronic forms and into CRM systems and electronic customer records virtually eliminates manual input and error.

A simple swipe or mobile capture of a driver’s license, state-issued ID, passport, or other government-issued ID easily captures relevant information, populates the database, and verifies the identity of customers in a single step that takes seconds. This saves time, money and frustration by simplifying a formerly cumbersome process that led to high abandonment rates and decreased operational efficiency.

2. Better Customer Relationships Increase Satisfaction & Loyalty

By eliminating the annoying pile of paperwork that most customers fill out on their first visit and dramatically reducing keystrokes via computers and mobile devices, you can be one step ahead of the competition, making your business more customer-friendly from the start. Increase conversion rates and see abandonment rates rapidly decline.

Add to that the additional time you can spend with your patients, clients or customers when you eliminate the lengthy check-in process, and identity solutions become a great way to start customer relationships on a positive note leading to increased satisfaction and long-term loyalty.

Online, e-commerce and mobile app transactions will appreciate the streamlined process enables them to proceed through to checkout or complete ID verification with minimal input of information and effort, even using facial recognition match via a selfie for quick and easy access.

Finally, you’ll build trust with customers when you take the time to verify their information and assure them of their personal data protection. Customers will appreciate your attention to safeguarding their identity, building rapport and brand loyalty.

3. Increased Security to Protect Against Increasingly Sophisticated Attacks

With identity theft, major data breaches and hackings on the rise, it’s more important than ever to verify the identities of customers and other visitors that enter your physical business (store, facility, practice, or campus) and also digital ones (online stores, platforms, etc.). Identity proofing solutions can instantly verify the identity of any visitor on premise or remotely and ensure both customers and employees feel safer.

The integrated technologies of many identity solutions can give your business the ability to process and verify visitors quickly while capturing detailed information and images from visitor IDs, business cards, or passports. You can even instantly check against global watch lists such as OFAC and Interpol, or create your own to flag persons of interest.

4. Prevent & Deter Fraud

Identity proofing doesn’t just verify that the credit card or other payment method is valid. It also verifies the identity of the card user, effectively preventing transactions from lost or stolen credit cards.

By instantly verifying the identity of shoppers both in-person and online, you’ll decrease fraudulent transactions which lead to lost merchandise and chargebacks that cut into your bottom line.

The cost of fraud is staggering. The average organization loses 10% of revenue from counterfeiting and it has been estimated that the value of counterfeit goods globally exceeds 1.7 trillion dollars annually – over 2% of the world’s total current economic output.

5. Enforce Age Verification & Regulatory Compliance

Identity verification technology makes it easy to comply with legal requirements imposed by state and federal laws. For example, if you serve alcohol or sell other regulated products that cannot be sold to minors, instant ID verification enables you to verify the validity of an ID and verify the age of potential customers. You stay in compliance with the law, avoid costly fines and provide a seamless customer experience.

In other highly regulated industries, such as finance, institutions can quickly and easily comply with KYC and AML regulations without worrying about compromising their customers’ PII.

New verification technology is changing the way business is done for the better. Paperwork and manual entry errors are virtually eliminated, security is increased to prevent fraud, be compliant and meet regulatory requirements. This can all be accomplished while at the same time providing a better customer experience. It’s a win-win for everyone.

 

 

security white paper cta

Acuant Named the Provider of Identity Verification Solutions for iDentyTech Solutions

LOS ANGELESFeb. 14, 2018  — Acuant, a global provider of identity verification solutions, today announced a partnership with iDentyTech solutions, a leading provider of intuitive identity management hardware and software platforms. Under the agreement, Acuant will be the provider of document validation for the iDentyTech IDT™ platform.

“Acuant’s partnership with iDentyTech allows our customers to use kiosks such as IDT Virtual Guard Tower for capturing identity documents and validating visitors on-site,” said Ephram Yeashoua, CEO of iDentytech. “With our Unified Management Platform, combining multi layers of automated identification technologies, a single guard can manage several entry points into a property or facility, ensuring only authorized people are allowed to enter. As a result, Security administrators can better secure their facilities with a great ROI whilst reducing criminal activity.”

Acuant is trusted around the world to help commercial organizations and government facilities improve and protect their business operations. Its solutions provide critical security, streamline workflows and protect against identity theft and fraud. Acuant’s AssureID patented technology extracts biometric and alphanumeric data contained in an identity document to authenticate it by applying more than 50 forensic document-specific tests and utilizing the industry’s largest document library, supporting over 196 countries.

“With AssureID integrated into iDentyTech solutions, customers can easily manage their facility’s physical security and authenticate IDs,” said Yossi Zekri, CEO of Acuant. “We are excited to partner with iDentyTech to make controlling a site easy and more secure.”

More information about securing your business can be found in Acuant’s new white paper, Protecting Your Business & Establishing Trust: The Importance of Identity Verification and How Businesses Should Choose Solutions.

About Acuant
Acuant has over 20 years of experience providing identity verification solutions to instantly reduce fraud while providing a seamless customer experience. Product offerings include intelligent data capture and auto-fill software, identity document authentication, chip and ePassport authentication with PKI, facial recognition software and expert manual review of documents. Acuant’s human assisted machine learning powers the industry’s largest identity document library covering more than 196 countries.

Solutions meet regulations such as KYC, AML and PII for any industry. Partners include start-ups, Fortune 500 and FTSE 350 organizations. For more information, please visit acuantcorp.com

 

 

 

 

 

Card-not-present Fraud Increases as Consumers Move Online and Mobile

One of the biggest fraud warnings in the US and around the world for 2017 was credit card fraud, particularly card-not-present fraud. In Europe, card-not-present fraud increased from 50% gross loss in 2008 to 70% last year, with most fraud impacting the UK and France. Fraud experts warn this is just the beginning. The research firm Juniper predicted a 71 Billion USD loss globally due to card-not-present fraud over the next 5 years. As history dictates, when technology advances, so do criminals.

Shoppers and businesses were warned that there might be a massive fraud spike during Black Friday weekend. But in an impressive turn against the tide, it looks like US retailers were well prepared to combat fraud this season. Unlike what was initially predicted, credit card fraud dropped for the first time over Black Friday weekend by 29%. After the industry was rocked by huge data breaches from Target and other retailers, it looks like the investments made to boost security paid off.

Technology Is the Problem and the Solution for Retail

This good news for the retail industry might be a temporary reprieve. The transition to EMV chips in credit cards plays a big role in reducing point-of-sale fraud and might account for the drop in fraud during the holiday shopping season. The reality is that fraudsters will continue to follow the consumers.

In the US, m-commerce has been increasing year-over-year. For this holiday shopping season, purchases made on mobile devices were a 36.9% of all sales, and e-commerce was up 17% from last year. As more consumers move to online and mobile shopping, expect to see more card-not-present fraud as well. Public wi-fi can encourage more consumers to use their mobile devices to shop, but all those transactions also create opportunities for hackers to get sensitive information through key-logging, phishing, and other scams. Consumers might feel protected by all the technology they are using and have no idea how just how much risk is actually connected to these conveniences. For example, shoppers in India often have 3 or more shopping apps on their smartphones and almost half of all consumers have been victims of retail fraud.

Retail shopping isn’t the only industry that should be bracing for more card-not-present fraud. The recent data breaches at financial institutions and on sharing economy platforms show that pretty much any kind of online or mobile transaction poses a high risk to consumers and businesses.

Invest in Security Now or Pay a High Cost Later

One effective security measure to protect against card-not-present fraud is to add multi-factor or biometric authentication to tie the transaction to an actual person. Linking transactions to identities can reduce the risk of fraud both at check-out as well as help to lower the amount of customer data that businesses manage and store. This means businesses can protect against fraud while also minimizing the risk of being a target for data breaches.

Investing in customer data protection and keeping transactions secure is essential in creating customer trust and loyalty.  With its high competition and slim margins, the retail industry has learned that it cannot afford to be reactive and was effective in curbing point-of-sale fraud during the peak shopping season. We learned this year that other industries wrongly thought themselves to be immune to hackers. The consequences of major data breaches can last for years and be a crippling cost to many businesses.

As you prepare for 2018, make sure your business is incorporating the best practices for securing customer data and preventing card-not-present fraud. It is more cost-effective to invest in security measures now than to pay a much steeper price later.

 

Acuant Solutions for Customer ID Verification

Fraudsters Want Your ID Information. What Are You Doing to Stop Them?

In 2016, identity theft amounted to $16 billion and affected more than 15.4 million people in the United States. Your identity is arguably your most valuable asset, but how often are you aware of all the ways that you use it to transact? With the lines of physical and digital identity becoming increasingly blurred, it’s more important than ever to safeguard your identity during transactions.

Are you doing enough to ensure you’re keeping your personal information – and your customers’ information – safe from fraudsters?

Click to download the free infographic: Where Does Your Identity Take You in a Day?

Every day, Americans make transactions by swiping, scanning or chip-reading – from grabbing a cup of coffee to purchasing airline tickets. The convenience of these transactions, it seems, trumps concerns of information falling into the wrong hands. But the time has passed for simply hoping our ID information – and our customers’ ID information – will continue to be safe, simply because you’ve seen no evidence it’s been compromised.

Just a Day in the Life for Identity Thieves

Let’s look at a typical day anyone could have to see how easily one can expose their ID information to considerable security risks.

Mobile banking. Shortly after leaving the office, a person decides to check the balance of their checking account. They use the local coffee shop’s free Wi-Fi, because like 67% of Millennials, they use a mobile app to access their banking information. Though on an open network, they tap in their ID, password and perhaps other Know Your Customer (KYC) information, as required by anti-money laundering (AML) regulations. Did a fraudster track their every keystroke?

Click to download the free infographic: Where Does Your Identity Take You in a Day?

Small business transactions. Because this person is now running late to a doctor appointment, they pull out their credit card to engage one of the 1,000 bike-sharing services across the country, a market that is expected to become a $6.1 billion business by 2020. Are the security measures employed by all 1,000 vendors up to par? How does this one rank?

Medical Insurance. At the doctor’s office, they check in at the front desk, making their co-pay with the same credit card and giving their medical insurance card information which is likely photocopied. Like most people, this person is more than likely unaware that 15.4 million medical records were stolen in 2016 alone, and that 301 people across the country were charged roughly $900 billion in false billing.

Remember, Identity Thieves Never Take a Vacation

Although you’re in a rest-and-relaxation mode, you still know not to leave your hotel room unlocked or your wallet on a car seat. If only you could take similar measures to protect your ID information. Here are some common transactions that require ID information on a typical vacation – and some data associated with their risk of security breaches.

Accommodations. The global vacation rental market is poised to be worth $193.89 billion by 2021. Fully 46% of customers check in using hotel loyalty programs, and loyal customers spend on average 67% more than new ones. Front desks and agencies are mostly taking your identity document photocopying it and storing it somewhere; a very insecure data capture method. All this makes vacation rental businesses likely targets for theft of identity information.

Ground transport. Uber reported that 40 million people used the ride-hailing service in 2016. Incidentally, 8,000 ride-hailing service drivers in Massachusetts failed to pass new state background checks in 2017. Similarly, car-rental agencies routinely require a check of ID documents to complete transactions and mostly use the archaic photocopy method of capturing your ID leaving you vulnerable to a paper file floating around.

The More You Know, the Better

Our free infographic, Where Does Your Identity Take You in a Day , illustrates just how important it is to protect your ID information.

Acuant provides businesses with identity proofing solutions for trusted transactions, for more information contact us here.

 

Read the Infographic